CN102194014A - Document storage method and document recovery method - Google Patents

Document storage method and document recovery method Download PDF

Info

Publication number
CN102194014A
CN102194014A CN2011101769879A CN201110176987A CN102194014A CN 102194014 A CN102194014 A CN 102194014A CN 2011101769879 A CN2011101769879 A CN 2011101769879A CN 201110176987 A CN201110176987 A CN 201110176987A CN 102194014 A CN102194014 A CN 102194014A
Authority
CN
China
Prior art keywords
document
burst
seed
document burst
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101769879A
Other languages
Chinese (zh)
Inventor
徐文平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Evermore Software Inc
Original Assignee
Wuxi Evermore Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Evermore Software Inc filed Critical Wuxi Evermore Software Inc
Priority to CN2011101769879A priority Critical patent/CN102194014A/en
Publication of CN102194014A publication Critical patent/CN102194014A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a document storage method which comprises the following steps: generating document fragmentation seeds against a document; dividing the document into a plurality of document fragments according to the document fragmentation seeds; and storing the document fragmentation seeds and the document fragments. By adopting the method, the document can be fragmented or re-combined to the result document which has the complete fragments and contents incapable of being read directly, and the storage safety is higher.

Description

Document storing method and document restoration methods
[technical field]
The present invention relates to the file storage field, particularly a kind of document storing method and document restoration methods.
[background technology]
Along with the propelling of informatization, various enterprise application softwares have become the important information means of enterprise development.The thing followed, the security of all kinds of documents in storage administration also becomes the problem that numerous enterprises is paid attention to day by day in the enterprise.In recent years, enterprise is with no paper, the popularizing of electronic office, and makes the easier leakage of internal information, enterprise's confidential document reveal the event frequency life that takes place frequently.
At present, all kinds of documents that generate in the application program can be used as an integral body usually and are kept in this locality, the webserver or in the database.The defective that this technology exists is: as long as there is the people to know the concrete path that the document is preserved, just can know the true content of the document easily.
Patent publication No. is that CN 101227602A and patent publication No. are that CN 101198016A has all set forth a kind of burst that at first Streaming Media carried out then with the method for its storage, but this disclosed technology mainly is the file at media formats, it mainly is that customizing messages according to media file carries out when burst, the file of the inapplicable extended formatting of mode of this burst, applicability is narrower; In addition, its fundamental purpose is in order to reduce the Network Transmission of file, to reduce the stand-by period of user's playing media file, and any measure is not taked in the security of media file.
Therefore being necessary to propose a kind of new technical scheme solves the problems referred to above.
[summary of the invention]
The purpose of this part is to summarize some aspects of embodiments of the invention and briefly introduces some preferred embodiments.In this part and the application's specification digest and denomination of invention, may do a little simplification or omit avoiding the making purpose of this part, specification digest and denomination of invention fuzzy, and this simplification or omit and can not be used to limit the scope of the invention.
One of purpose of the present invention is to provide a kind of document storing method, and to be stored in the pre-position, the security of storage is higher with a document burst or the complete burst result document that is reassembled into reading of content not directly for it.
Two of purpose of the present invention is also to provide a kind of document restoration methods, its at above-mentioned document storing method with will be independently slicing files or not directly the complete burst result document of reading of content read out.
According to an aspect of the present invention, the invention provides a kind of document storing method, it comprises at document generation document burst seed; According to described document burst seed described document is divided into a plurality of document bursts; With described document burst seed and described document burst are stored.
Further, described document burst seed is the security information generation of content, attribute and/or user's input according to document; Described document burst seed comprises: the size of document burst quantity, each document burst, the separation sequence between the document burst, the built-up sequence between the document burst, the memory location of document burst and/or the cipher mode of document burst.
Further, described a plurality of document burst is according to the size of document burst quantity, each document burst in the document burst seed and the separation sequence between the document burst described document to be carried out burst to generate.
Further, described document burst seed and described document burst are stored comprised: store described document burst seed into precalculated position; Memory location according to each document burst stores each document burst to form a plurality of individual document slicing files respectively.
Further, described document burst seed also comprises the index list between a document burst, and the index list between described document burst comprises the stored position information of described each document burst.
Further, described document burst seed and described document burst are stored comprised: store described document burst seed into precalculated position; According to the built-up sequence between the document burst in the described document burst seed document burst is combined into a new complete burst result document.
Further, described according to described document burst seed described document is divided into a plurality of document bursts after, described method also comprises: the cipher mode according to document burst in the described document burst seed carries out encryption to each document burst.
According to a further aspect in the invention, the present invention also provides a kind of document restoration methods, and it comprises: the document burst seed that finds a document correspondence; Recover based on the isolated document burst of the document according to described document burst seed; With recover to obtain original true document according to described document burst seed and described document burst.
Further, described recovering based on the isolated document burst of the document according to described document burst seed comprises: according to the index list between the document burst in the described document burst seed all the document bursts under the index list are all recovered out; Describedly recover to obtain original true document according to described document burst seed and described document burst and comprise: all document bursts are made up to obtain original true document according to separation sequence in the document burst seed.
Further, described according to the index list between the document burst in the described document burst seed all the document bursts under the index list are all recovered out after, described method also comprises: judge whether described document burst is encrypted, if encrypted, then described document burst is decrypted according to the cipher mode between the document burst in the described document burst seed.
Further, described recovering based on the isolated document burst of the document according to described document burst seed comprises: the stored position information according to document burst in the described document burst seed recovers out with complete burst result document, according to the built-up sequence between the document burst in the document burst seed described complete burst result document is split document burst after obtaining splitting then; Describedly recover to obtain original true document according to described document burst seed and described document burst and comprise: make up to obtain original true document according to all the document bursts after the built-up sequence between the document burst will split in the document burst seed.
Further, described according to the built-up sequence between the document burst in the document burst seed described complete burst result document is split after, described method also comprises:
It is encrypted whether the described document burst after judgement splits advances, if encrypted, then according to the cipher mode between the document burst in the document burst seed described document burst is decrypted.
Compared with prior art, the present invention proposes a kind of document storing method, it at first will generate corresponding document burst seed by document, produce the document burst according to described document burst seed information then, subsequently document burst seed and document burst be stored; When recovering document, at first the document burst is recovered out, all document bursts are made up obtain original true document then according to document burst seed.In addition, behind the generation document burst it is encrypted, accordingly, can be decrypted when recovering, the storage security of so further increase document realizes simple.
[description of drawings]
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the accompanying drawing of required use is done to introduce simply in will describing embodiment below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.Wherein:
Fig. 1 is document storing method method flow diagram in one embodiment among the present invention; With
Fig. 2 is document restoration methods method synoptic diagram in one embodiment among the present invention.
[embodiment]
Detailed description of the present invention is mainly come the running of direct or indirect simulation technical solution of the present invention by program, step, logical block, process or other symbolistic descriptions.Be the thorough the present invention that understands, in ensuing description, stated a lot of specific detail.And when not having these specific detail, the present invention then may still can realize.Affiliated those of skill in the art use these descriptions herein and state that the others skilled in the art in affiliated field effectively introduce their work essence.In other words, be the purpose of the present invention of avoiding confusion, because the understanding easily of method of knowing and program, so they are not described in detail.
Alleged herein " embodiment " or " embodiment " are meant special characteristic, structure or the characteristic that can be contained at least one implementation of the present invention.Different in this manual local " in one embodiment " that occur not are all to refer to same embodiment, neither be independent or optionally mutually exclusive with other embodiment embodiment.In addition, represent the sequence of modules in method, process flow diagram or the functional block diagram of one or more embodiment and revocablely refer to any particular order, also be not construed as limiting the invention." a plurality of " of indication are two or more in the literary composition; In the literary composition " and/or " be meant and or or, comprise A, B, C, AB, AC, BC such as A, B and/or C, several situations of ABC.
Fig. 1 is document storing method 100 method flow diagram in one embodiment among the present invention, and described document storing method 100 comprises:
Step 110 generates document burst seed at a document.
Described document generally can be the document of word form, excel form, txt form, ppt form, rar form and extended formatting, perhaps also can be file.In actual applications; usually can be according to the content of document; the attribute of document is (as the size of document; the time that document produces etc.); and/or the security information of user's input is to produce corresponding document burst seed; wherein the restriction by document content can guarantee that each document has a unique document burst seed; and in order further to guarantee the security of its document storage; the processing of just document being stored when the user imports correct security information is only arranged; promptly have the talent of authority can store described document, and the size of document can be used for the follow-up processing of document being carried out burst.
Describedly generate document burst seed at a document and can realize by a lot of algorithms, in one embodiment, can produce the value of the MD5 (Message Digest Algorithm) of document content earlier according to the content of document, produce the value of new MD5 according to the size of the value of the MD5 that obtains and corresponding document, the security information of user's input then, the value of the MD5 that will generate is for the second time got Hash (hash) value to obtain document burst seed at last.By the above-mentioned algorithm that is used to generate document burst seed as can be seen, the security information of the content of the document correspondence that each is different, the size of document and user's input is incomplete same, so can corresponding obtain different document burst seeds through described algorithm.
Usually, the described document burst seed of the attribute of described content according to document, document and relevant information generation can comprise the size of document burst quantity, each document burst, the separation sequence between the document burst, the built-up sequence between the document burst, the memory location of document burst and/or the cipher mode of document burst etc.Here the size of each the document burst that obtains according to described document burst seed can be the same or different; more excellent; in order to improve security; the size of each document burst that the algorithm by above-mentioned generation document burst seed produces can be positioned at a predetermined interval usually; in order to guarantee to be convenient to deposit and discern; this interval generally can not be too big, as the absolute value of the value of the document burst of maximum and the difference of the value of minimum document burst about 1k.
Wherein, in the process of carrying out document storage, separation sequence between described document burst can be identical with built-up sequence between the document burst, like this, can directly utilize the separation sequence between the document burst that gets access to that it is made up when document is reconfigured.Certainly, separation sequence and the built-up sequence between the document burst between described document burst also can be inequality, accordingly, can directly utilize the built-up sequence between described document burst that it is made up when document is reconfigured.Built-up sequence between the separation sequence between document burst described here and document burst whether identical setting depends primarily on the mode of document burst storage, and this problem will describe in detail in the back.
Step 120 is divided into a plurality of document bursts according to described document burst seed with described document.
Document can be carried out fragment process according to the document burst quantity of document burst seed, the size of each document burst and the information such as separation sequence between the document burst.
Step 130 is stored described document burst seed and described document burst.
Each preserves the system of the document when keeping the document, at first document burst seed to be saved in preposition, such as, if desired document storing is arrived local disk, then described precalculated position also should be some prepositions of local disk; For another example, if desired with described document storing in the webserver, then described precalculated position also should be the some prepositions in the described webserver; Again such as, if desired with described document storing in database, then described precalculated position also should be a certain preposition in the described database.
And the storage of document burst can decide according to the stored position information of each document burst seed in the document burst seed usually.If the memory location of each document burst is partly or entirely inequality in the document burst seed that generates, then means and all document bursts will be stored into appointed positions to form a plurality of individual document slicing files; If the memory location of each document burst is all identical in the document burst seed that generates, then mean and will store all document bursts into same position, also just mean and all document bursts need be made up to be stored in this position.
Tell about the mode of above-mentioned two kinds of document bursts storage below respectively.
In the document burst seed that generates under the situation partly or entirely inequality of the memory location of each document burst: the stored position information according to each document burst seed stores each document burst accordingly to form a plurality of individual document slicing files respectively.
Usually, in order to guarantee the security of each individual document burst, can after step 120, encrypt described document burst according to the cipher mode of document burst in the described document burst seed, to store through the described document burst after encrypting again afterwards, like this since each independently the document slicing files be not a full document and through after the above-mentioned encryption, also can not get real information even the user opens described document burst in the position that described document burst is deposited.
It should be noted that in the memory location of described document burst described document burst seed also can comprise the index list between a document burst when inequality, it comprises the stored position information of described each document burst.Index list between the document burst helps finding all to leave the document burst of different memory locations in when recovering described document.
Under the situation that the memory location part of each document burst is all identical in the document burst seed that generates: the built-up sequence in according to described document burst seed between the document burst is combined into a new complete burst result document with the document burst.
At this moment, if the memory location homogeneous phase of described all document bursts simultaneously, and the document burst is not encrypted, in order to guarantee when depositing described document burst, to be difficult for directly being recovered by the interceptor, usually the built-up sequence between the document burst and the separation sequence between described document burst before can be set to differently in described document burst seed this moment, and the new complete burst result document that obtains like this is not original true document.That is to say, even each burst is not encrypted, in order to guarantee the security of content, it is different that built-up sequence between can the document burst and the separation sequence between the document burst before are set to, so just can guarantee to reconfigure new for complete burst result document be not original true document.
Certainly, in order to improve the security of document storage, can before being stored, encrypt the document burst described document burst, that is to say, after described document being divided into a plurality of document bursts, adopt the cipher mode of document burst in the described document burst seed that described document burst is encrypted according to described document burst seed.If after having adopted cipher mode that each document burst is encrypted then the built-up sequence of carrying out between the document burst of combination can be identical with the separation sequence between described document burst, because after encrypting, again its combination also can directly not returned to the real information of document again according to the separation sequence between described burst; Certainly, in order further to guarantee the security of storage, the built-up sequence between described document burst can be not yet with described document burst between separation sequence identical.
As from the foregoing, at the memory location of described all document bursts homogeneous phase simultaneously, if each document burst does not pass through above-mentioned encryption, and the new complete burst result document that the combination of the built-up sequence between the employing burst different with the separation sequence between described document burst obtains, described new complete burst result document is not original real document, can not obtained inner information easily; And if each document is through above-mentioned encryption, even described document burst makes up through the separation sequence between described document burst, the user also can not get real document information, therefore, the document burst is encrypted can further improve the security that document is deposited.
In actual applications, because described deposit position can be local disk, also can be the webserver, even can also be network data base, if when leaving in the webserver or the network data base, then at first need set up a Network Transmission with the document deposit end at document generation end is connected, described document burst seed then is connected by described Network Transmission with described document burst and is sent to document deposit end (as the webserver or network data base), corresponding, described document burst seed then should comprise the information of the transmission sequence between the document burst, after at first document burst seed being transferred to the document deposit end, the information according to the transmission sequence between described document burst is transferred to the document deposit end with described document again.Why such order is arranged, and mainly is because the take over party can determine whether to receive described document burst according to the information of the quantity of document burst in the described document burst seed; Or judge according to the transmission sequence of document whether the document burst that receives is correct; Or determine whether to receive correct document burst that generation side sends etc. according to the information of the size of each document burst in the described document burst seed.
Described Network Transmission connects and can connect in wired or wireless mode, in actual applications, can adopt various host-host protocols, as HTML (Hypertext Markup Language) (http agreement), message queue etc., document burst seed is transmitted.Usually at the host-host protocol of choosing, only need be with its corresponding protocols information as packet header, the back adds document burst seed or the document burst can form different packets, accordingly, receiving end can extract according to the information of described host-host protocol with document burst seed in the packet or document burst after receiving described packet.Form as for the packet that forms according to host-host protocol has been that those of ordinary skill in the field can both realize, and not as important inventive point of the present invention, so just no longer describe in detail here.
In sum, document deposit method provided by the invention is at first carried out original document burst and is encrypted, then the document burst is stored according to preposition, even the user views the true content that each document burst also can not be learnt document in the memory location, the security of document storage is higher.
Fig. 2 is document restoration methods 200 method synoptic diagram in one embodiment among the present invention, and described document restoration methods 200 comprises step:
Step 210 finds the document burst seed of a document correspondence.
Described document burst seed generally comprises: the size of document burst quantity, each document burst, the separation sequence between the document burst, the built-up sequence between the document burst, the memory location of document burst and/or the cipher mode of document burst.Depositing terminal and then can determine whether to receive all document bursts according to the document burst quantity in the document burst seed at document burst seed and document burst; Or determine whether to receive correct document burst that generation side sends etc. according to the information of the size of each document burst in the described document burst seed.Even, when needs are transferred to far-end with described document, described document burst seed also comprises the transmission sequence between the document burst, the document burst then transmits according to the transmission sequence between described document burst, corresponding, the depositing terminal and then can judge whether the document burst that receive is correct of document burst according to the transmission sequence of document.
Step 220 recovers based on the isolated document burst of the document according to described document burst seed.
In concrete the application, the storage of described document burst has two kinds of forms usually, and a kind of is that all document bursts are stored in different positions respectively to form a plurality of individual document slicing files; Another kind is that all document bursts have been combined into a complete burst result document.
According to two kinds of storage modes of above-mentioned document burst, adopt diverse ways to recover described document burst respectively.
All document bursts be stored in respectively different positions with the situation that forms a plurality of individual document slicing files under: usually, when depositing described document burst according to the index list between the document burst in the document burst seed, each document divides sector-meeting corresponding memory location, promptly an index list between the document burst can be formed in all memory locations, and when depositing terminal and need recover described document slicing files, then respectively described document slicing files is recovered out according to described document burst index list.In one embodiment, described index list can comprise three branches, first branch comprises 10 memory locations in file 1 catalogue under the local disk D dish, as D: file 1 document burst 1, D: file 1 document burst 2, ..., D: file 1 document burst 10; Second branch comprises 10 memory locations in file 2 catalogues under the local disk E dish, as E: file 2 document burst 1, E: file 2 document burst 2 ..., E: file 2 document burst 10; The 3rd branch comprises 10 memory locations in file 3 catalogues under the local disk F dish, as F: file 3 document burst 1, F: file 3 document burst 2 ..., F: file 3 document burst 10.Three all described 30 document bursts of branch all can be recovered out according to described index list like this.
Be combined under the situation of a complete burst result document at all document bursts: each document burst in the described burst complete result document may encryptedly have been crossed at this moment, perhaps the burst complete result document that obtains this moment is to make up according to the built-up sequence between the document burst that is different from the separation sequence between the document burst, and it all can not see real document content.If at this moment the latter then needs according to the fractionation order it to be split, should fractionation the rule of built-up sequence between then corresponding its described document burst when making up of order.Certainly, after described each document burst is encrypted, also can adopt with described document burst between built-up sequence between the identical document burst of separation sequence make up, when being split, it splits by built-up sequence between the document burst of correspondence, after then each document burst being decrypted, it is reconfigured once more to obtain real document according to the separation sequence between described document burst.It is fashionable that the document that common not process is encrypted carries out the burst storage sets, the mode of this combination is that the array mode corresponding to described separation sequence is different in built-up sequence and the described document burst seed between described document burst, and the new burst complete result document that obtains when like this each document being made up also is a mess code of not directly learning content.
In a word, no matter which kind of pattern storage above-mentioned document burst adopts, after getting access to each document burst, generally understand it and encrypt judgement, promptly judge whether encrypted mistake of described document burst, if encrypted mistake then is decrypted described document burst according to the cipher mode between the document burst in the described document burst.
Step 230 recovers to obtain original true document with described all document burst seeds and described document burst.
All document bursts be stored in respectively different positions with the situation that forms a plurality of individual document slicing files under: do not carry out encryption if judge to confirm described document burst, then can directly all document bursts be recovered out one by one, by the separation sequence between the document burst in the document burst seed of pre-position correspondence described document burst be made up to obtain original real document then by the index list between above-mentioned document burst.
And if through judge confirming that described document burst had carried out encryption, then at first described document burst is recovered out one by one by the index list between described document burst, cipher mode according to document burst in the document burst seed of the correspondence of described pre-position is decrypted described document burst then, according to the separation sequence between the document burst in the described document burst seed described document burst is made up to obtain original real document at last.
Be combined under the situation of a complete burst result document at all document bursts: described each document burst after directly the built-up sequence between the document burst of the document burst seed by the pre-stored position will split makes up to obtain original true document.
In sum, the information of ground, document restoration methods provided by the invention utilization and memory location place document burst seed will reconfigure to obtain original true document to leave the document burst of depositing terminal in.
In actual applications, described document restoration methods 200 is normally corresponding with described document storing method 100, what storage document burst in the even described document storing method 100 adopted is according to the index list between the document burst all document bursts to be deposited separately respectively, and 200 of then described accordingly document restoration methods read described document burst according to the index list between described document burst; If it is that all document bursts are made up forming a complete burst result document that the storage document burst in the described document storing method 100 adopts, 200 of then described accordingly document restoration methods split described complete burst result document to obtain the document burst.
Above-mentioned explanation has fully disclosed the specific embodiment of the present invention.It is pointed out that and be familiar with the scope that any change that the person skilled in art does the specific embodiment of the present invention does not all break away from claims of the present invention.Correspondingly, the scope of claim of the present invention also is not limited only to previous embodiment.

Claims (12)

1. document storing method is characterized in that it comprises:
Generate document burst seed at a document;
According to described document burst seed described document is divided into a plurality of document bursts; With
Described document burst seed and described document burst are stored.
2. document storing method according to claim 1 is characterized in that: described document burst seed is that the security information of content, attribute and/or user's input according to document generates; Described document burst seed comprises: the size of document burst quantity, each document burst, the separation sequence between the document burst, the built-up sequence between the document burst, the memory location of document burst and/or the cipher mode of document burst.
3. document storing method according to claim 2 is characterized in that: described a plurality of document bursts are according to the size of document burst quantity, each document burst in the document burst seed and the separation sequence between the document burst described document to be carried out burst to generate.
4. document storing method according to claim 3 is characterized in that: described document burst seed and described document burst are stored comprised:
Store described document burst seed into precalculated position;
Memory location according to each document burst stores each document burst to form a plurality of individual document slicing files respectively.
5. document storing method according to claim 4 is characterized in that: described document burst seed also comprises the index list between a document burst, and the index list between described document burst comprises the stored position information of described each document burst.
6. document storing method according to claim 3 is characterized in that: described document burst seed and described document burst are stored comprised:
Store described document burst seed into precalculated position;
According to the built-up sequence between the document burst in the described document burst seed document burst is combined into a new complete burst result document.
7. according to claim 4 or 6 described document storing methods, it is characterized in that: described according to described document burst seed described document is divided into a plurality of document bursts after, described method also comprises:
Cipher mode according to document burst in the described document burst seed carries out encryption to each document burst.
8. document restoration methods based on the described document storing method of claim 1 is characterized in that it comprises:
Find the document burst seed of a document correspondence;
Recover based on the isolated document burst of the document according to described document burst seed; With
Recover to obtain original true document according to described document burst seed and described document burst.
9. document restoration methods according to claim 8 is characterized in that:
Described recovering based on the isolated document burst of the document according to described document burst seed comprises: according to the index list between the document burst in the described document burst seed all the document bursts under the index list are all recovered out;
Describedly recover to obtain original true document according to described document burst seed and described document burst and comprise: all document bursts are made up to obtain original true document according to separation sequence in the document burst seed.
10. document restoration methods according to claim 9 is characterized in that: described according to the index list between the document burst in the described document burst seed all the document bursts under the index list are all recovered out after, described method also comprises:
Judge whether described document burst is encrypted,, then described document burst is decrypted according to the cipher mode between the document burst in the described document burst seed if encrypted.
11. document restoration methods according to claim 8 is characterized in that:
Described recovering based on the isolated document burst of the document according to described document burst seed comprises: the stored position information according to document burst in the described document burst seed recovers out with complete burst result document, according to the built-up sequence between the document burst in the document burst seed described complete burst result document is split document burst after obtaining splitting then;
Describedly recover to obtain original true document according to described document burst seed and described document burst and comprise: make up to obtain original true document according to all the document bursts after the built-up sequence between the document burst will split in the document burst seed.
12. document restoration methods according to claim 11 is characterized in that: described according to the built-up sequence between the document burst in the document burst seed described complete burst result document is split after, described method also comprises:
It is encrypted whether the described document burst after judgement splits advances, if encrypted, then according to the cipher mode between the document burst in the document burst seed described document burst is decrypted.
CN2011101769879A 2011-06-28 2011-06-28 Document storage method and document recovery method Pending CN102194014A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101769879A CN102194014A (en) 2011-06-28 2011-06-28 Document storage method and document recovery method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101769879A CN102194014A (en) 2011-06-28 2011-06-28 Document storage method and document recovery method

Publications (1)

Publication Number Publication Date
CN102194014A true CN102194014A (en) 2011-09-21

Family

ID=44602082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101769879A Pending CN102194014A (en) 2011-06-28 2011-06-28 Document storage method and document recovery method

Country Status (1)

Country Link
CN (1) CN102194014A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801784A (en) * 2012-07-03 2012-11-28 华为技术有限公司 Distributed type data storing method and equipment
CN103197987A (en) * 2012-01-04 2013-07-10 中兴通讯股份有限公司 Data backup method, data recovery method and cloud storage system
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN106302472A (en) * 2016-08-09 2017-01-04 厦门乐享新网络科技有限公司 The hidden method of information and device
CN107665310A (en) * 2016-07-29 2018-02-06 四川长虹电器股份有限公司 Encryption storage, reading and the delet method of a kind of mobile terminal document
CN111008401A (en) * 2019-12-10 2020-04-14 中国银行股份有限公司 Text saving method and device
CN112134914A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Distributed secure storage strategy based on cryptography
CN116305301A (en) * 2023-05-26 2023-06-23 南昌工程学院 Personnel electronic archive data protection method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137027A (en) * 2006-11-23 2008-03-05 中兴通讯股份有限公司 Media slicing memory method
CN101216791A (en) * 2008-01-04 2008-07-09 华中科技大学 File backup method based on fingerprint

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137027A (en) * 2006-11-23 2008-03-05 中兴通讯股份有限公司 Media slicing memory method
CN101216791A (en) * 2008-01-04 2008-07-09 华中科技大学 File backup method based on fingerprint

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103197987A (en) * 2012-01-04 2013-07-10 中兴通讯股份有限公司 Data backup method, data recovery method and cloud storage system
CN102801784A (en) * 2012-07-03 2012-11-28 华为技术有限公司 Distributed type data storing method and equipment
CN102801784B (en) * 2012-07-03 2015-11-25 华为技术有限公司 A kind of distributed data storage method and equipment
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN104298926B (en) * 2013-07-19 2017-11-10 腾讯科技(深圳)有限公司 A kind of method and apparatus for running encryption file
CN107665310A (en) * 2016-07-29 2018-02-06 四川长虹电器股份有限公司 Encryption storage, reading and the delet method of a kind of mobile terminal document
CN106302472A (en) * 2016-08-09 2017-01-04 厦门乐享新网络科技有限公司 The hidden method of information and device
CN106302472B (en) * 2016-08-09 2019-12-24 厦门乐享新网络科技有限公司 Information hiding method and device
CN111008401A (en) * 2019-12-10 2020-04-14 中国银行股份有限公司 Text saving method and device
CN112134914A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Distributed secure storage strategy based on cryptography
CN116305301A (en) * 2023-05-26 2023-06-23 南昌工程学院 Personnel electronic archive data protection method and system

Similar Documents

Publication Publication Date Title
AU2019203850B2 (en) Constructing blockchain world state merkle patricia trie subtree
AU2019203849B2 (en) Updating blockchain world state merkle patricia trie subtree
CN102194014A (en) Document storage method and document recovery method
CN111448781B (en) Computer-implemented method for communicating shared blockchain data
EP3669280B1 (en) Shared blockchain data storage
AU2018348335B2 (en) Performing a recovery process for a network node in a distributed system
EP3345360B1 (en) Method for storing an object on a plurality of storage nodes
US8824687B2 (en) Method and system for pacing, acking, timing, and handicapping (path) for simultaneous receipt of documents employing encryption
Ali et al. Blockstack: A new decentralized internet
CA2806729A1 (en) Method and system for pacing, ack'ing, timing, and handicapping (path) for simultaneous receipt of documents
EP3837657B1 (en) Managing transaction requests in ledger systems
US10749696B1 (en) Managing blockchain-based centralized ledger systems
CN104836656B (en) A kind of storage of video file and transmission method
CN109302495A (en) A kind of date storage method and device
EP3834157B1 (en) Managing transaction requests in ledger systems
Ali et al. Blockstack technical whitepaper
EP3841549B1 (en) Managing transaction requests in ledger systems
CN107197057A (en) DNS account book processing method and processing devices
Raul et al. Blockchain technology for decentralized data storage on P2P network
CN105099930A (en) Method and device for controlling traffic of encrypted data flow
CN102355474B (en) Document sending method, document receiving method and document transmitting method
CN106899602A (en) distributed computing platform and its file management method
CN117857589A (en) Data transmission control method of Internet of things
CN111241092A (en) Block chain based species publishing system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110921